SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks

@article{Zhang2016SeDSSD,
  title={SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks},
  author={Aiqing Zhang and J. Chen and R. Hu and Y. Qian},
  journal={IEEE Transactions on Vehicular Technology},
  year={2016},
  volume={65},
  pages={2659-2672}
}
  • Aiqing Zhang, J. Chen, +1 author Y. Qian
  • Published 2016
  • Computer Science
  • IEEE Transactions on Vehicular Technology
  • Security and availability are two crucial issues in device-to-device (D2D) communication, with its fast development in fourth-generation (4G) Long-Term Evolution Advanced (LTE-Advanced) networks. In this paper, we propose a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communication. Specifically, a public-key-based digital signature, combined with a mutual authentication mechanism of a cellular… CONTINUE READING
    95 Citations
    UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications
    • 26
    • Highly Influenced
    Secure and Efficient Data Sharing Scheme for D2D Communication in LTE Advanced Network
    • Alassane Coulibaly
    • 2018
    Flexible data access control in D2D communications
    • 15
    • PDF
    A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network
    A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks
    • 2
    Secure Data Transmission Protocol
    Secure content sharing protocol for D2D users based on profile matching in social networks
    • 5
    Robust and Scalable Data Access Control in D2D Communications
    • 1
    A Lightweight and Secure Data Sharing Protocol for D2D Communications
    • Highly Influenced
    A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks

    References

    SHOWING 1-10 OF 30 REFERENCES
    GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications
    • 819
    • Highly Influential
    • PDF
    Noninteractive Pairwise Key Establishment for Sensor Networks
    • 48
    Secure Cooperative Data Downloading in Vehicular Ad Hoc Networks
    • 36
    • Highly Influential
    • PDF
    Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks
    • 130
    Joint physical-application layer security for wireless multimedia delivery
    • 79
    Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks
    • 57
    • PDF
    LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks
    • X. Lin
    • Computer Science
    • IEEE Journal on Selected Areas in Communications
    • 2013
    • 31
    An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications
    • 20
    • PDF
    Distributed Access Control with Privacy Support in Wireless Sensor Networks
    • 85
    • PDF
    Understanding Cryptography: A Textbook for Students and Practitioners
    • 624